Bill Sommerfeld wrote:

>>> wes-4       the sha*sum commands (and any other commands delivered by this
>>>     project which use cryptographic hashes) should use one of the
>>>     existing hash function implementations in Solaris rather than 
>>>     delivering a new copy.  (see libmd(3LIB)).
>>   Disagree on economic grounds.  The cryptographic functions in the
>>   package are Project Private and, at present, deviation would introduce
>>   a maintenance cost not borne by other distributions that choose to
>>   include these utilities.  
> 
> I don't believe this analysis is as straightforward as you think.
> 
> We do processor-specific performance tuning of many cryptographic
> algorithms; by delivering additional implementations, you either (a)
> dilute the value of this performance tuning effort, or (b) require the
> additional implementations to be tuned, which will more than eliminate
> any savings from delivering a redundant implementation.  
> 
> This may also complicate cryptographic certification.  

We also strongly discourage duplication of cryptographic implementations 
because it complicates export approval. That's not a huge concern for 
digest functions, but in general it's another reason to prefer 
centralized crypto implementations.

        Scott

Reply via email to